1. A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?
A. Signal strength
B. Duplex mismatch
C. Power budget Correct
D. CRC
Explanation
If PoE (Power over Ethernet) APs fail to start, the most common reason is insufficient power. The 'Power budget' refers to the total power available from the PoE switch or injector. If the previous five APs consumed too much of the available power, there might not be enough remaining power in the budget for the sixth AP to power on. This should be the first thing to investigate.
2. Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?
A. Implement the solution.
B. Verify full system functionality. Correct
C. Document findings.
D. Test the theory.
Explanation
After implementing a solution (or a potential solution during troubleshooting), 'Verifying full system functionality' involves testing to ensure the problem is resolved and no new issues have been introduced. Comparing current throughput tests to a baseline is a crucial part of this verification step, ensuring that performance has returned to expected levels.
3. A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?
A. Mesh
B. Infrastructure
C. Ad hoc Correct
D. Point-to-point
Explanation
An ad hoc wireless network allows devices to connect directly to each other without the need for an access point or router. This is suitable for a small, temporary network like connecting two laptops directly to a Wi-Fi-enabled printer when no access points are available.
4. A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to load a time card. Which of the following best describes how the VPN is being used?
A. Clientless Correct
B. Client-to-site
C. Full tunnel
D. Site-to-site
Explanation
A VPN accessed via a web browser to reach an internal system is characteristic of a clientless (or web-based SSL) VPN. This type of VPN does not require specific client software installation and typically provides access to specific web applications or internal resources through the browser itself, often utilizing TLS for security.
5. A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?
A. F-type
B. RJ11
C. BNC
D. SC Correct
Explanation
SC (Subscriber Connector or Standard Connector) is a common type of fiber optic connector used for single-mode and multimode fiber. It's often found in patch panels and enterprise network environments. F-type is for coaxial cable, RJ11 is for telephone lines, and BNC is for coaxial cable (video/networking).